business requirements

Results 301 - 325 of 409Sort Results By: Published Date | Title | Company Name

Three Guiding Principles for Data Security and Compliance

Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy, security, it management, knowledge management, data management
    
IBM

CISOs Guide to Enabling a Cloud Security Strategy: Focus on SaaS

Published By: IBM     Published Date: Apr 04, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, ciso, cloud, cloud security, saas, security, cloud computing
    
IBM

Three guiding principles for data security and compliance

Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM

IDC white paper: CISOs' Guide to Enabling a Cloud Security Strategy: Focus on SaaS

Published By: IBM     Published Date: Jul 14, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, idc, ciso, cloud security, saas, networking, enterprise applications, data management, business technology
    
IBM

The Importance of B2B integration

Published By: IBM     Published Date: Sep 14, 2016
IDC analyst Chandana Gopal shares the reasons as to why the line of business is critical in helping create a modernized B2B architecture that is scalable, reliable, and can quickly adapt to changing business requirements.
Tags : 
ibm, b2b, requirements, scale, reliability, platform, knowledge management, enterprise applications, business technology, data center
    
IBM

Preparing for the Next Generation of Enterprise Applications

Published By: IBM     Published Date: Oct 07, 2016
The world of IT is rapidly transforming — from back office process automation to front line engagement. Put another way, IT no longer supports the business, it *is* the business. The challenge is, the application architectures and processes of existing applications are inadequate to support the requirements of tomorrow’s IT. This presentation will discuss the changing nature of business and customer engagement and discuss what capabilities IT must put in place to deliver the next generation of enterprise applications.
Tags : 
ibm, cloud, middleware, infrastructure, enterprise applications, application performance management, apm, networking, knowledge management, business technology
    
IBM

IDC Business Value Executive Brief: Assessing the Business Value of IBM Digital Experience on Cloud

Published By: IBM     Published Date: Oct 12, 2016
Read this IDC analyst report to see how you can meet your digital business requirements with IBM Digital Experience on Cloud.
Tags : 
ibm, commerce, digital experience, idc, business value, ibm digital experience on the cloud, networking, knowledge management, enterprise applications, business technology
    
IBM

Smart Insights, Visibility, and Troubleshooting for IBM DataPower Gateways

Published By: IBM     Published Date: Dec 15, 2016
The IBM DataPower Operations Dashboard provides the most robust solution in the marketplace for monitoring DataPower gateways and performing trouble-shooting & analysis. Administrators can view operational data with full-text search to immediately diagnose errors and highlight impact analysis, DevOps can view and troubleshoot their own DataPower services, and business owners can generate automated reports to meet SLA and compliance requirements without assistance from centralized IT.
Tags : 
ibm, middleware, ibm datapower gateways, ibm datapower operations dashboard, enterprise applications
    
IBM

IDC - The New Need for Speed in the Datacenter Network

Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco

Evaluator Group - Evolving Datacenter Architectures - HP technologies for Cloud-ready IT

Published By: Hewlett-Packard     Published Date: Aug 02, 2013
"Cloud computing, also known as 'IT as a Service', is predicated on delivering IT services on demand, an idea that has support from business leaders as a way to better align IT with business operations. Cloud computing has two key requirements: virtualized applications and seamless support and integration between the server, networking, storage and hypervisor components. In this paper, we explore these concepts and highlight the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components-with a particular focus on the important role that storage plays in the evolution of the datacenter architecture."
Tags : 
datacenter, architectures, cloud, virtualization, blade servers, network attached storage, storage management, storage virtualization, data center design and management, business technology, infrastructure, design and facilities, infrastructure management
    
Hewlett-Packard

Executive Guide to Understanding Business Requirements

Published By: IAG Consulting     Published Date: Nov 01, 2006
This white paper is structured so that each page is its own "mini-white-paper" but each is also part of a total look at better structuring requirements documents, processes and content completeness. At the end of this paper is a one page "tear-out" summary which is both a shortened distillation of the content, and a diagnostic tool to start a peer discussion on your organization's performance.
Tags : 
it management, digital mosaic, executive guide, business requirements, business management, strategy, business analysis, productivity, business metrics, best practices, executive, iag, iag consulting, business analytics
    
IAG Consulting

Getting Consensus on Business Requirements: Tips and Traps

Published By: IAG Consulting     Published Date: Aug 17, 2007
Before your company launches its next package selection, implementation or upgrade, make sure you don’t cripple the project from the start by failing to identify your requirements – the number one reason that projects spin out of control. This white paper summarizes some of the key lessons we have learned through our industry-leading requirements definition practice.
Tags : 
systems development, system development, sdlc, business requirements, project planning, defining, definition, define the problem, erp, enterprise resource planning, project management, iag, iag consulting, digital mosaic, it management, business management, business process management, change management
    
IAG Consulting

Getting Business Requirements Right

Published By: IAG Consulting     Published Date: Aug 17, 2007
The later in the system development life-cycle that major errors are discovered the more expensive it is to fix them. But the earliest stages of the systems development lifecycle (SDLC) are most often the least consistently executed. This paper describes a methodology that brings the early stages of the SDLC up to a high level of maturity: consistent, proven, and optimized for success. 
Tags : 
systems development, system development, sdlc, business requirements, project planning, erp, enterprise resource planning, project management, iag, iag consulting, digital mosaic, change management, system management software, productivity
    
IAG Consulting

Hitting the Mark The Impact of Requirements Maturity on Project Outcome

Published By: IAG Consulting     Published Date: Apr 16, 2010
Nearly three out of every four companies have low requirements maturity and achieve the business objectives of their projects only 54% of the time. Low requirements maturity undermines every major measure of development efficiency and simply leads to poor project results.
Tags : 
iag, project management, project management, maturity, consulting, collaboration
    
IAG Consulting

Executive Guide to Evaluating Business Requirements Quality

Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements, business intelligence, business management
    
IAG Consulting

Executive Guide to Business Requirements

Published By: IAG Consulting     Published Date: Jan 28, 2012
The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, business, evaluation, technology, successful projects, application integration, business analytics, business integration, business intelligence, business technology
    
IAG Consulting

TEI of SilverSky Network Security Solutions

Published By: SilverSky     Published Date: May 09, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.
Tags : 
silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity, security infrastructure, compliance, business requirements, information security, networking, security, it management
    
SilverSky

HRG Assessment: Comparing IBM PureSystems and Cisco UCS

Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
hrg, harvard research group, ibm, ibm pureflex system, ibm flex system, applications, application delpoyment, application integration, integration, integrated system, it resources, computing, storage, networking, virtualization, enterprise applications, data management, business technology
    
IBM

Leveraging the network for your virtualization and cloud intiatives

Published By: IBM     Published Date: Oct 10, 2013
A though leadership white paper discusses how virtualization, cloud computing, and the proliferation of smart devices are helping companies meet their goals and be more effective with their IT investments but are placing increased demands on the datacenter network. Organizations can no longer afford to treat the datacenter network as an afterthought, and it is not sufficient to simply throw more ports or bandwidth at the problem. IBM offers a portfolio of datacenter network planning, integration, and management services designed to maximize customers' DCN success. By working with customers to plan and implement the appropriate network design at the beginning of an IT project, IBM can help customers meet their business requirements, minimize operating costs, and build in flexibility for the future.
Tags : 
leveraging networks, virtualization, cloud intiatives, networking, cloud computing, datacenter, it investments, minimize operating costs, build flexibility, threats, leadership, proliferation, effectiveness, wireless communications, server virtualization, content delivery
    
IBM

Laying the Foundation for Successful Business Analytics Solution Deployments

Published By: IBM     Published Date: Apr 18, 2014
This IDC paper discusses the critical role of hardware infrastructure in business analytics deployments, citing best practices, the IDC's decision framework, and four client case studies - Wellpoint, Vestas, AXTEL, and Miami-Dade County. IDC's recommendation is that "infrastructure cannot — and should not — be an afterthought". Hardware infrastructure and software requirements must be determined in parallel to maximize the success of business analytics projects.
Tags : 
ibm, business analytics, deployment, hardware, infrastructure, business analytics solutions, workload, server hardware
    
IBM

Elevate the Branch Office Experience with an Application-Centric Platform

Published By: Cisco     Published Date: Apr 10, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.
Tags : 
cisco, routers, wan, wlan, rich application services, wireless devices, wifi, wireless hardware, employee performance, productivity
    
Cisco

Cisco Validated Design Summary for BYOD

Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity, mobile computing, mobile data systems, mobile workers, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless service providers
    
Cisco

ESG Microsoft Hybrid Cloud Report

Published By: Cisco     Published Date: Jun 10, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity, cloud, enterprise, hybrid, convergence, application integration, application performance management, business intelligence, virtualization, cloud computing, infrastructure
    
Cisco

ESG Microsoft Hybrid Cloud Report

Published By: Cisco     Published Date: Aug 28, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements. These solutions are typically comprised of both private and public cloud deployments, resulting in the creation of hybrid clouds that are designed to rapidly scale up and down in response to user demands, and they provide the advantages of elastic computing economics.
Tags : 
cloud, hybrid, iot, public cloud, content management system, project management, cloud computing
    
Cisco

The New Need for Speed in the Datacenter Network

Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.